CVE-2026-26956
Full Sandbox Escape in vm2
Publication date: 2026-05-04
Last updated on: 2026-05-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vm2 | vm2 | to 3.10.5 (exc) |
| vm2 | vm2 | 3.10.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-693 | The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in vm2 version 3.10.4, an open source sandbox for Node.js. It allows an attacker to escape the sandbox completely and execute arbitrary code on the host system. Specifically, code running inside VM.run() can access the host process object and execute host commands without any cooperation from the host.
This issue was fixed in version 3.10.5.
How can this vulnerability impact me? :
This vulnerability can have severe impacts because it allows an attacker to break out of the sandbox and execute arbitrary commands on the host system. This can lead to full system compromise, data theft, data corruption, or disruption of services.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade vm2 to version 3.10.5 or later, where the full sandbox escape issue has been patched.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in vm2 allows an attacker to escape the sandbox and execute arbitrary code on the host system without cooperation from the host. This can lead to unauthorized access, data breaches, and potential manipulation or exfiltration of sensitive information.
Such unauthorized access and potential data compromise could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over data confidentiality, integrity, and access.
However, the provided information does not explicitly mention compliance impacts or regulatory considerations.